SlideShare a Scribd company logo
Information Security
Basics of the Information Security
Sohrab Monfared
IT Instructor / Security Specialist
@CentreICT
Information security aka. InfoSec
● Information security, sometimes shortened to InfoSec, is
the practice of Defending information from unauthorized
access, use, disclosure, disruption, modification,
perusal, inspection, recording or destruction.
It is a general term that can be used regardless of the form
the data may take (electronic, physical, etc.)
Defending? Defend from who?
● Competitor
– BMW vs Toyota
– P.R.C. vs U.S.A.
– Huawei vs CISCO
● Black Hat Hackers
– IT Specialists who are mostly hired by
Organized/Unorganized criminals.
Who is the target though?
● Governments
– Oh, you've got some economical plans? Let us have a look ;)
● Military
– New artillery shell? New machine gun?
● Corporations
– You've got some products? We(Attackers) may want to damage
it or maybe make a copy.
● Financial Institutions
– Mr.X is a rich guy, let's see how many “Franklins” he has in his
account.
Key Concepts of InfoSec
● CIA! not FBI, nor NSA!
– Confidentiality
– Integrity
● This means that data cannot be modified in an
unauthorized or undetected manner.
– Availability
● The system and the resources should works properly
and be available.
How to make it secure then?
No way, you can not ;)
In the best case, you can reduce the
damage and the causality of a data
breach.
But wait... I think I've got some hints for
that.
Logical vs Physical
First we decide it by logic, then we apply it by physic :D
Logical: Least Privileges
Do we really need to run the Firefox as administrator?
Physical: Separation of Duties
A web developer doesn't need the root password of the
server.
Who DID it?
● Who was wise and well
informed!
Defense In Depth
is the most effective
method of defense.
Access Control
● Access to protected information must be restricted to people
who are authorized to access the information.
● Access control is generally considered in three steps:
– Identification
● Who are you? Are you really Dean Davis?
– Authentication
● How can you prove that? Any driver's license?
– Authorization
● Okay Mr.Davis but wait...
You are a Programmer, not a Network Administrator!
Cryptography
● Information security uses cryptography to transform usable
information into a form that renders it unusable by anyone
other than an authorized user.
● What about Encryption? It was the exact definition of the
Encryption and for doing it, we use the Cryptography
techniques.
Hello → J$$$qpys (Encryption)
J$$$qpys → Hello (Decryption)
Almost done...
Thanks for your attention
(Questions are welcome)

More Related Content

Viewers also liked (7)

Learning management system
Learning management systemLearning management system
Learning management system
 
Как заработать деньги на своем сайте?
Как заработать деньги на своем сайте?Как заработать деньги на своем сайте?
Как заработать деньги на своем сайте?
 
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для ВузовУправление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
Управление проектом и ИКТР Учебное пособие по ИКТ для Развития для Вузов
 
Jafar urunov
Jafar urunovJafar urunov
Jafar urunov
 
Программное обеспечение в государственных учреждениях
Программное обеспечение в государственных учрежденияхПрограммное обеспечение в государственных учреждениях
Программное обеспечение в государственных учреждениях
 
Информационная безопасность в аспекте веб-разработки
Информационная безопасность в аспекте веб-разработкиИнформационная безопасность в аспекте веб-разработки
Информационная безопасность в аспекте веб-разработки
 
About ICT4D Journal Tajikistan
About ICT4D Journal Tajikistan About ICT4D Journal Tajikistan
About ICT4D Journal Tajikistan
 

Similar to Information Security

Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Berezha Security Group
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
NTEN
 

Similar to Information Security (20)

Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 

More from E-Journal ICT4D

Открытые данные общеобразовательных учреждений г. Душанбе
Открытые данные общеобразовательных учреждений г. ДушанбеОткрытые данные общеобразовательных учреждений г. Душанбе
Открытые данные общеобразовательных учреждений г. Душанбе
E-Journal ICT4D
 
ҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣ
ҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣ
ҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣ
E-Journal ICT4D
 
рустам назаров, уктам кимсанов
рустам назаров, уктам кимсановрустам назаров, уктам кимсанов
рустам назаров, уктам кимсанов
E-Journal ICT4D
 
рустам назаров, уктам кимсанов
рустам назаров, уктам кимсановрустам назаров, уктам кимсанов
рустам назаров, уктам кимсанов
E-Journal ICT4D
 
Kanevskiy. mobile g cloud. from russia with the success
Kanevskiy. mobile g cloud. from russia with the successKanevskiy. mobile g cloud. from russia with the success
Kanevskiy. mobile g cloud. from russia with the success
E-Journal ICT4D
 
E gov successfactors-korea_isaac_kim_final
E gov successfactors-korea_isaac_kim_finalE gov successfactors-korea_isaac_kim_final
E gov successfactors-korea_isaac_kim_final
E-Journal ICT4D
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
E-Journal ICT4D
 
Egov afghanistan presentation omar ansari
Egov afghanistan presentation omar ansariEgov afghanistan presentation omar ansari
Egov afghanistan presentation omar ansari
E-Journal ICT4D
 
Apcict efforts4 humancapacitydevelopment_asomtalk_tajik
Apcict efforts4 humancapacitydevelopment_asomtalk_tajikApcict efforts4 humancapacitydevelopment_asomtalk_tajik
Apcict efforts4 humancapacitydevelopment_asomtalk_tajik
E-Journal ICT4D
 
Международная программа «Электронное управление в целях устойчивого развития ...
Международная программа «Электронное управление в целях устойчивого развития ...Международная программа «Электронное управление в целях устойчивого развития ...
Международная программа «Электронное управление в целях устойчивого развития ...
E-Journal ICT4D
 
Open Education resource - Dilovar Munavvarov
Open Education resource - Dilovar MunavvarovOpen Education resource - Dilovar Munavvarov
Open Education resource - Dilovar Munavvarov
E-Journal ICT4D
 
Workshop - how to make your research open
Workshop - how to make your research openWorkshop - how to make your research open
Workshop - how to make your research open
E-Journal ICT4D
 
Open access as factor to develop information culture - Asomiddin Atoev
Open access as factor to develop information culture - Asomiddin AtoevOpen access as factor to develop information culture - Asomiddin Atoev
Open access as factor to develop information culture - Asomiddin Atoev
E-Journal ICT4D
 
Visualization of information - Talat Numonov
Visualization of information - Talat NumonovVisualization of information - Talat Numonov
Visualization of information - Talat Numonov
E-Journal ICT4D
 
Transition to digital tv (dttv)
Transition to digital tv (dttv)Transition to digital tv (dttv)
Transition to digital tv (dttv)
E-Journal ICT4D
 
«МегаФон» открывает ярмарку вакансий для студентов Согда
«МегаФон» открывает ярмарку вакансий для студентов Согда«МегаФон» открывает ярмарку вакансий для студентов Согда
«МегаФон» открывает ярмарку вакансий для студентов Согда
E-Journal ICT4D
 

More from E-Journal ICT4D (20)

Taj keyboard presentation
Taj keyboard presentationTaj keyboard presentation
Taj keyboard presentation
 
Открытые данные общеобразовательных учреждений г. Душанбе
Открытые данные общеобразовательных учреждений г. ДушанбеОткрытые данные общеобразовательных учреждений г. Душанбе
Открытые данные общеобразовательных учреждений г. Душанбе
 
ҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣ
ҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣ
ҷорикунии элементҳои ҳукумати электронӣ дар донишкадаи политехникӣ
 
рустам назаров, уктам кимсанов
рустам назаров, уктам кимсановрустам назаров, уктам кимсанов
рустам назаров, уктам кимсанов
 
рустам назаров, уктам кимсанов
рустам назаров, уктам кимсановрустам назаров, уктам кимсанов
рустам назаров, уктам кимсанов
 
Presentation
PresentationPresentation
Presentation
 
Kanevskiy. mobile g cloud. from russia with the success
Kanevskiy. mobile g cloud. from russia with the successKanevskiy. mobile g cloud. from russia with the success
Kanevskiy. mobile g cloud. from russia with the success
 
Emis
EmisEmis
Emis
 
E gov successfactors-korea_isaac_kim_final
E gov successfactors-korea_isaac_kim_finalE gov successfactors-korea_isaac_kim_final
E gov successfactors-korea_isaac_kim_final
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Egov afghanistan presentation omar ansari
Egov afghanistan presentation omar ansariEgov afghanistan presentation omar ansari
Egov afghanistan presentation omar ansari
 
Apcict efforts4 humancapacitydevelopment_asomtalk_tajik
Apcict efforts4 humancapacitydevelopment_asomtalk_tajikApcict efforts4 humancapacitydevelopment_asomtalk_tajik
Apcict efforts4 humancapacitydevelopment_asomtalk_tajik
 
Международная программа «Электронное управление в целях устойчивого развития ...
Международная программа «Электронное управление в целях устойчивого развития ...Международная программа «Электронное управление в целях устойчивого развития ...
Международная программа «Электронное управление в целях устойчивого развития ...
 
Open Education resource - Dilovar Munavvarov
Open Education resource - Dilovar MunavvarovOpen Education resource - Dilovar Munavvarov
Open Education resource - Dilovar Munavvarov
 
Workshop - how to make your research open
Workshop - how to make your research openWorkshop - how to make your research open
Workshop - how to make your research open
 
Open access as factor to develop information culture - Asomiddin Atoev
Open access as factor to develop information culture - Asomiddin AtoevOpen access as factor to develop information culture - Asomiddin Atoev
Open access as factor to develop information culture - Asomiddin Atoev
 
Visualization of information - Talat Numonov
Visualization of information - Talat NumonovVisualization of information - Talat Numonov
Visualization of information - Talat Numonov
 
Transition to digital tv (dttv)
Transition to digital tv (dttv)Transition to digital tv (dttv)
Transition to digital tv (dttv)
 
Firdavs yormatov
Firdavs yormatovFirdavs yormatov
Firdavs yormatov
 
«МегаФон» открывает ярмарку вакансий для студентов Согда
«МегаФон» открывает ярмарку вакансий для студентов Согда«МегаФон» открывает ярмарку вакансий для студентов Согда
«МегаФон» открывает ярмарку вакансий для студентов Согда
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Information Security

  • 1. Information Security Basics of the Information Security Sohrab Monfared IT Instructor / Security Specialist @CentreICT
  • 2. Information security aka. InfoSec ● Information security, sometimes shortened to InfoSec, is the practice of Defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc.)
  • 3. Defending? Defend from who? ● Competitor – BMW vs Toyota – P.R.C. vs U.S.A. – Huawei vs CISCO ● Black Hat Hackers – IT Specialists who are mostly hired by Organized/Unorganized criminals.
  • 4. Who is the target though? ● Governments – Oh, you've got some economical plans? Let us have a look ;) ● Military – New artillery shell? New machine gun? ● Corporations – You've got some products? We(Attackers) may want to damage it or maybe make a copy. ● Financial Institutions – Mr.X is a rich guy, let's see how many “Franklins” he has in his account.
  • 5. Key Concepts of InfoSec ● CIA! not FBI, nor NSA! – Confidentiality – Integrity ● This means that data cannot be modified in an unauthorized or undetected manner. – Availability ● The system and the resources should works properly and be available.
  • 6. How to make it secure then? No way, you can not ;) In the best case, you can reduce the damage and the causality of a data breach. But wait... I think I've got some hints for that.
  • 7. Logical vs Physical First we decide it by logic, then we apply it by physic :D Logical: Least Privileges Do we really need to run the Firefox as administrator? Physical: Separation of Duties A web developer doesn't need the root password of the server.
  • 8. Who DID it? ● Who was wise and well informed! Defense In Depth is the most effective method of defense.
  • 9. Access Control ● Access to protected information must be restricted to people who are authorized to access the information. ● Access control is generally considered in three steps: – Identification ● Who are you? Are you really Dean Davis? – Authentication ● How can you prove that? Any driver's license? – Authorization ● Okay Mr.Davis but wait... You are a Programmer, not a Network Administrator!
  • 10. Cryptography ● Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user. ● What about Encryption? It was the exact definition of the Encryption and for doing it, we use the Cryptography techniques. Hello → J$$$qpys (Encryption) J$$$qpys → Hello (Decryption)
  • 11. Almost done... Thanks for your attention (Questions are welcome)